Authentication protocol

Results: 881



#Item
721Finite fields / Cryptographic protocols / Galois/Counter Mode / Hashing / Secure Real-time Transport Protocol / IPsec / IEEE 802.1AE / CMAC / HMAC / Cryptography / Message authentication codes / Block cipher modes of operation

GCM Update David McGrew and John Viega [removed], [removed] May 31, [removed]

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-05 13:52:56
722Computer network security / Wireless networking / Wireless security / Extensible Authentication Protocol / Occupational safety and health / Employee assistance program / Employment compensation

Confidential Accessible Respectful Effective Solution-focused

Add to Reading List

Source URL: www.hr.wa.gov

Language: English - Date: 2014-08-04 15:02:02
723Comment / Metadata / Reference / Source code / Computer network security / Extensible Authentication Protocol / Information / Computing / Data

1905038100FFY2011 Initial Monitoring Tool Service Provider SP ID

Add to Reading List

Source URL: www.liheap.ncat.org

Language: English - Date: 2013-10-18 21:08:00
724Computing / Wireless security / Electronic engineering / Wireless networking / Wireless network / Protected Extensible Authentication Protocol

Microsoft Word - URWIN WindowsXP Client Procedures.doc

Add to Reading List

Source URL: is.richmond.edu

Language: English - Date: 2013-11-20 10:32:40
725Social Security / Internal control / LEAP / Auditing / Lightweight Extensible Authentication Protocol

STATE OF COLORADO John W. Hickenlooper Governor Reggie Bicha Executive Director

Add to Reading List

Source URL: www.liheap.ncat.org

Language: English - Date: 2013-10-19 00:14:00
726Network architecture / FTP / Email authentication / Internet privacy / Pretty Good Privacy / Email / File Transfer Protocol / Zip / Internet / Computing / Internet standards

v1.2 Indiana Bulk Upload Guide 2013

Add to Reading List

Source URL: www.in.gov

Language: English - Date: 2014-08-07 08:06:07
727Access control / Authentication / Notary / Packaging / Debugging / JavaScript / Password authentication protocol / Security / Computing / Internet protocols

Package ‘rfigshare’ August 5, 2014 Description an R interface to figshare.com. Title an R interface to figshare.com. Version[removed]License CC0

Add to Reading List

Source URL: cran.r-project.org

Language: English - Date: 2014-08-04 18:35:43
728Technology / Cryptographic protocols / Computer security / IEEE 802.11 / Wi-Fi / Wireless security / Extensible Authentication Protocol / Wireless LAN / IEEE 802.1X / Computer network security / Wireless networking / Computing

Wireless[removed]Architecture Standard

Add to Reading List

Source URL: dti.delaware.gov

Language: English - Date: 2013-11-26 14:07:06
729Message authentication codes / Hashing / Public key infrastructure / HMAC / Digital signature / Electronic signature / Symmetric-key algorithm / Cryptographic protocol / Certificate policy / Cryptography / Key management / Public-key cryptography

NIST SP[removed], Introduction to Public Key Technology and the Federal PKI Infrastructure

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-02-01 16:36:25
730Information / Logical Link Control / Modems / Point-to-point protocol / Communications protocol / Authentication / Data / Internet standards / Computing

General notes for the ARIB standard in English version: The copyrights and distribution rights for this document are ascribed to the Association of Radio Industries and Business (ARIB). The original "MITF Dial-up Dorman

Add to Reading List

Source URL: www.arib.or.jp

Language: English - Date: 2010-09-30 04:12:57
UPDATE